RSA® Education Services Blog

RSA Governance & Lifecycle – Fundamentals

Occasional Contributor Occasional Contributor
Occasional Contributor
0 0 903

HEADER_header .png

Access Training
for RSA Employees

Access Training
for Customers



If you need further assistance, contact us


Course Description

This Self-Paced training offers an overview of the solution modules and components, demonstrates the cloud and On-Prem system14-rsa-customer-success-.png architectures, and presents the main functionalities for RSA Governance & Lifecycle and its various deployment models. It also presents the advantages of RSA G&L Cloud and the limitations of RSA G&L's traditional On-Prem offerings. 

Delivery Type

Self Paced


2 Hours



Prerequisite Knowledge



Learning Objectives

Upon completion of this training, the student should be able to: 

  • Understand how the solution addresses identity risks. 
  • Become acquainted with RSA Governance and Lifecycle (Cloud Solution).
  • Signify the advantages of RSA G&L Cloud over the various traditional RSA G&L “On-Prem” deployment models. 
  • Identify currently supported On-Prem deployment models and explain the limitations of each model.    
  • Identify the main application modules and components  
  • Discover the main solution features, functionalities, and capabilities. 
  • Distinguish various use cases for business-oriented end-users. 


Course Outline

Module # 

Module name 

Learning Objectives / What Student will be able to Do Upon Completing this Module 

Module 1 


  • Define problems and risks that are mitigated by RSA Governance & Lifecycle.  
  • Elaborate on the Generic IGA Concepts. 

Module 2 

RSA Governance & Lifecycle - Cloud 

  • Introduce RSA G&L, the full-featured governance and lifecycle solution provided entirely from the cloud. 
  • Specify the advantages of adopting the cloud solution. 

Module 3 

RSA G&L – Traditional On-Prem Solutions 

  • Identity all the supported deployment models of RSA G&L. 
  • Understand the advantages and limitations of each deployment model.  
  • Differentiate between the requirements of each deployment model. 
  • Determine the most suitable deployment scenario for your organization’s requirements. and environment. 

Module 4 

Solution Components 

  • Discover the main application modules and components 
  • Explain the main function of each module.  

Module 5 

Solution Features and Capabilities 

  • Define the main application components and features and demonstrate the application's purpose, functions, and capabilities. 
  • Explain the functional elements that need to be configured and how components interact with each other. 
  • Elaborate on how application components address identity management risks. 
  • Identify the modules and components that meet your organization's requirements. 

Module 6 

Introduce User Personas  

  • Introduce the different types of personas that interact with the solution, focusing solely on the non-technical end-users. 
  • List down general end users along with their main responsibility on the solution. 
  • Specify each end user’s solution privileges and what actions can be performed 


Access Training
for RSA Employees

Access Training
for Customers



If you need further assistance, contact us